Sciweavers

644 search results - page 83 / 129
» Translation the Wiki way
Sort
View
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 8 months ago
Efficient incremental constrained clustering
Clustering with constraints is an emerging area of data mining research. However, most work assumes that the constraints are given as one large batch. In this paper we explore the...
Ian Davidson, S. S. Ravi, Martin Ester
VLSID
2007
IEEE
153views VLSI» more  VLSID 2007»
14 years 8 months ago
Extracting Logic Circuit Structure from Conjunctive Normal Form Descriptions
Boolean Satisfiability is seeing increasing use as a decision procedure in Electronic Design Automation (EDA) and other domains. Most applications encode their domain specific cons...
Zhaohui Fu, Sharad Malik
OSDI
2004
ACM
14 years 8 months ago
Middleboxes No Longer Considered Harmful
Intermediate network elements, such as network address translators (NATs), firewalls, and transparent caches are now commonplace. The usual reaction in the network architecture co...
Michael Walfish, Jeremy Stribling, Maxwell N. Kroh...
SIGMOD
2009
ACM
140views Database» more  SIGMOD 2009»
14 years 8 months ago
Distributed data-parallel computing using a high-level programming language
The Dryad and DryadLINQ systems offer a new programming model for large scale data-parallel computing. They generalize previous execution environments such as SQL and MapReduce in...
Michael Isard, Yuan Yu
ESORICS
2002
Springer
14 years 7 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz